HolyBugx

511 posts

HolyBugx banner
HolyBugx

HolyBugx

@HolyBugx

AppSec, and Automation.

가입일 Temmuz 2020
556 팔로잉12K 팔로워
HolyBugx
HolyBugx@HolyBugx·
@rez0__ Lots of contradiction & speculation with little data. - "Hackbots find 1 % of vulns" → How was this measured? - 2 → 3 → 4 % isn't a law; one jump ≠ trend. - "Hackbot singularity this year" clashes with your "slow hand-off" Where are the citations? Evidence or just vibes?
English
1
0
17
1.6K
Joseph Thacker
Joseph Thacker@rez0__·
You'll hate my new post on my blog. Or maybe you'll love it. "This is How They Tell Me Bug Bounty Ends" 😊 Enjoy!
Joseph Thacker tweet media
English
37
56
349
44.2K
SinSinology
SinSinology@SinSinology·
My English has never been good, I tried to translate what I had in my mind and I hope this shows how I feel Every step of this journey was a challenge—long hours, sacrifices, and moments when it felt impossible. But it was all worth it. I’m so proud and honored to have won 1st place at the Pwn2Own 2025 competition! To the amazing @thezdi team: your hard work, care, and passion made this event possible. You didn’t just host a competition—you gave me a chance to dream bigger, work harder, and achieve something great. Thank you for every second of your work and effort! And to God: thank You for being my strength, my guide, and my reason to keep going through the toughest moments. I am forever grateful. 💙🙏
SinSinology tweet media
TrendAI Zero Day Initiative@thezdi

And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. #P2OAuto

English
60
17
470
38.8K
HolyBugx 리트윗함
Sam Curry
Sam Curry@samwcyo·
New blog post with @infosec_au: We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely. The issue was reported and patched. Full post here: samcurry.net/hacking-subaru
English
47
312
1K
117.6K
HolyBugx 리트윗함
d4d
d4d@zakfedotkin·
Introducing the Cookie Sandwich, a tasty technique to steal HttpOnly cookies using legacy RFC features: portswigger.net/research/steal…
English
2
92
264
29.4K
HolyBugx 리트윗함
Michael Stepankin
Michael Stepankin@artsploit·
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
Michael Stepankin tweet media
English
7
80
297
30K
HolyBugx 리트윗함
daniel
daniel@hackermondev·
Research into a unique 0-click deanonymization exploit targeting Signal, Discord and hundreds of platform 🧵
daniel tweet mediadaniel tweet media
English
102
486
4.4K
419.9K
HolyBugx 리트윗함
d4d
d4d@zakfedotkin·
Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Neither did we. Enjoy! portswigger.net/research/bypas…
English
4
65
246
14.9K
HolyBugx 리트윗함
HTTPVoid
HTTPVoid@httpvoid0x2f·
Check out our latest blog post! We dive into GitHub Enterprise’s SAML implementation and explore an authentication bypass in encrypted assertion mode. CVE-2024-4985 / CVE-2024-9487: GitHub Enterprise SAML Authentication Bypass. projectdiscovery.io/blog/github-en…
English
0
49
181
16.7K
HolyBugx 리트윗함
James Kettle
James Kettle@albinowax·
Love a good client-side exploit chain! This crazy cross-product chain targeting Google by @rebane2001 is a great example of the type of exploit that gets easier the longer you spend targeting a single company lyra.horse/blog/2024/09/u…
English
1
104
403
41.6K
HolyBugx 리트윗함
watchTowr
watchTowr@watchtowrcyber·
In August, watchTowr Labs hijacked parts of the global .mobi TLD - and went on to discover the mayhem that we could cause. Enjoy.... labs.watchtowr.com/we-spent-20-to…
English
9
126
344
49.2K
HolyBugx 리트윗함
Ian Carroll
Ian Carroll@iangcarroll·
In April, @samwcyo and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa
English
51
630
2.2K
188.2K
HolyBugx 리트윗함
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code from 1996
English
37
648
1.8K
214.5K
HolyBugx 리트윗함
RyotaK
RyotaK@ryotkak·
I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…
English
15
245
796
121.7K